Linux
Linux¶
Linux Kernel Module Rootkit
How Htop works
Linux Exploit Suggester
Gathers info about local system, users, and domain information stealthy
Linux Post Exploitation techniques will ensure that we maintain some level of access and can potentially lead to deeper footholds into our targets trusted network.
Privilege Escalation¶
Linux kernel privilege escalation enumeration and exploitation framework
Vulnerability scanner for Linux/FreeBSD
Local Linux Enumeration & Privilege Escalation Checks
Built in SUID Binaries¶
Privilege Escalation binaries
Find SUID binaries and auto exploit them